메뉴 건너뛰기




Volumn 10, Issue 11, 2013, Pages 37-41

Certificateless proxy identity-based signcryption scheme without bilinear pairings

Author keywords

certificateless signcryption; elliptic curve discrete logarithm problem; identity based cryptography; proxy signcryption

Indexed keywords


EID: 84890057288     PISSN: 16735447     EISSN: None     Source Type: Journal    
DOI: 10.1109/CC.2013.6674208     Document Type: Article
Times cited : (20)

References (23)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes [C]
    • August 19-22 1984 Santa Barbara, CA, USA
    • SHAMIR A. Identity-Based Cryptosystems and Signature Schemes [C]//Proceedings of CRYPTO 84 on Advances in Cryptology: August 19-22, 1984. Santa Barbara, CA, USA, 1985, 196: 47-53.
    • (1985) Proceedings of CRYPTO 84 on Advances in Cryptology , vol.196 , pp. 47-53
    • Shamir, A.1
  • 2
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues [C]
    • December 17-19 Cirencester, UK 2001
    • COCKS C. An Identity Based Encryption Scheme Based on Quadratic Residues [C]//Proceedings of the 8th IMA International Conference on Cryptography and Coding: December 17-19, 2001. Cirencester, UK, 2001, 2260: 360-363.
    • (2001) Proceedings of the 8th IMA International Conference on Cryptography and Coding , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 3
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing [J]
    • BONEH D, FRANKLIN M K. Identity-Based Encryption from the Weil Pairing [J]. SIAM Journal on Computing, 2003, 32(3): 586-615.
    • (2003) SIAM Journal on Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 4
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography [C]
    • November 30-December 4 Taipei, Taiwan, China 2003
    • AL-RIYAMI S S, PATERSON K G. Certificateless Public Key Cryptography [C]//Proceedings of ASIACRYPT 2003: November 30-December 4, 2003. Taipei, Taiwan, China, 2003: 452-473.
    • (2003) Proceedings of ASIACRYPT 2003 , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 7
    • 63449122349 scopus 로고    scopus 로고
    • Digital Signcryption or How to Achieve Cost (Signature & Encryption) Cost (Signature) + Cost (Encryption)
    • Advances in Cryptology - CRYPTO '97
    • ZHENG Yuliang. Digital Signcryption or How to Achieve Cost (Signature & Encryption)? Cost (Signature)+Cost (Encryption) [C]//Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'97): August 17-21, 1997. Santa Barbara, California, USA, 1997: 165-179. (Pubitemid 127112551)
    • (1997) Lecture Notes In Computer Science , Issue.1294 , pp. 165-179
    • Zheng, Y.1
  • 9
    • 33947512019 scopus 로고    scopus 로고
    • Formal proofs for the security of signcryption [J]
    • BAEK J, STEINFELD R, ZHENG Yuliang. Formal Proofs for the Security of Signcryption [J]. Journal of Cryptology, 2007, 20(2): 203-235.
    • (2007) Journal of Cryptology , vol.20 , Issue.2 , pp. 203-235
    • Baek, J.1    Steinfeld, R.2    Zheng, Y.3
  • 12
    • 70449102675 scopus 로고    scopus 로고
    • Certificateless signcryption scheme in the standard model [J]
    • LIU Zhenhua, HU Yupu, ZHANG Xiangsong, et al. Certificateless Signcryption Scheme in the Standard Model [J]. Information Sciences, 2012, 180(3): 452-464.
    • (2012) Information Sciences , vol.180 , Issue.3 , pp. 452-464
    • Liu, Z.1    Yupa, H.U.2    Zhang, X.3
  • 14
    • 79959951878 scopus 로고    scopus 로고
    • Cryptanalysis of an elliptic curve-based signcryption scheme [J]
    • TOORANI M. Cryptanalysis of an Elliptic Curve-Based Signcryption Scheme [J]. International Journal of Network Security, 2012, 10(1): 51-56.
    • (2012) International Journal of Network Security , vol.10 , Issue.1 , pp. 51-56
    • Toorani, M.1
  • 16
    • 0040712314 scopus 로고    scopus 로고
    • How to construct efficient signcryption schemes on elliptic curves
    • PII S0020019098001677
    • ZHENG Yuliang, IMAI H. How to Construct Efficient Signcryption Schemes on Elliptic Curves [J]. Information Processing Letters, 1998, 68: 227-233. (Pubitemid 128379473)
    • (1998) Information Processing Letters , vol.68 , Issue.5 , pp. 227-233
    • Zheng, Y.1    Imai, H.2
  • 19
    • 20244388769 scopus 로고    scopus 로고
    • An efficient scheme for secure message transmission using proxy-signcryption [C]
    • January 1999 Auckland, New Zealand
    • GAMAGE C, LEIWO J, ZHENG Yuliang. An Efficient Scheme for Secure Message Transmission Using Proxy-Signcryption [C]//Proceedings of the 22nd Australasian Computer Science Conference: January, 1999. Auckland, New Zealand, 1999: 420-431.
    • (1999) Proceedings of the 22nd Australasian Computer Science Conference , pp. 420-431
    • Gamage, C.1    Leiwo, J.2    Zheng, Y.3
  • 20
    • 26444616640 scopus 로고    scopus 로고
    • Efficient identity based proxy-signcryption schemes with forward security and public verifiability
    • Networking and Mobile Computing: Third International Conference, ICCNMC 2005. Proceedings
    • WANG Meng, LI Hui, LIU Zhijing. Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability [C]//Proceedings of the Third International Conference on Networking and Mobile Computing (ICCNMC 2005): August 2-4, 2005. Zhangjiajie, China, 2005: 982-991. (Pubitemid 41435839)
    • (2005) Lecture Notes in Computer Science , vol.3619 , pp. 982-991
    • Wang, M.1    Li, H.2    Liu, Z.3
  • 21
    • 23044435243 scopus 로고    scopus 로고
    • Efficient implementation of pairing-based cryptosystems [J]
    • BARRETO P S L M, LYNN B, SCOTT M. Efficient Implementation of Pairing-Based Cryptosystems [J]. Journal of Cryptology, 2004, 17(4): 321-334.
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 321-334
    • Barreto, P.S.L.M.1    Lynn, B.2    Scott, M.3
  • 23


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.